{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T08:54:00Z","timestamp":1773824040611,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20176"],"award-info":[{"award-number":["U20A20176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging. Inform. med."],"DOI":"10.1007\/s10278-024-01384-4","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T16:09:14Z","timestamp":1735920554000},"page":"2716-2728","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Faster Privacy-Preserving Medical Image Diagnosis Scheme with Machine Learning"],"prefix":"10.1007","volume":"38","author":[{"given":"Jiuhong","family":"Ran","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3221-2671","authenticated-orcid":false,"given":"Dong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"1384_CR1","doi-asserted-by":"crossref","unstructured":"Sharifi, Abbas and Ahmadi, Mohsen and Mehni, Mohammad Amin and Jafarzadeh Ghoushchi, Saeid and et al., \u201cExperimental and numerical diagnosis of fatigue foot using convolutional neural network,\u201d Computer Methods in Biomechanics and Biomedical Engineering, 24, 844-848, Taylor & Francis\u00a0(2021).","DOI":"10.1080\/10255842.2021.1921164"},{"key":"1384_CR2","doi-asserted-by":"crossref","unstructured":"Veluchamy, S and Sudharson, S and Annamalai, R and Bassfar, Zaid and Aljaedi, Amer and et al., \u201cAutomated detection of COVID-19 from multimodal imaging data using optimized convolutional neural network model,\" Journal of Imaging Informatics in Medicine, 1-15\u00a0(2024).","DOI":"10.1007\/s10278-024-01077-y"},{"key":"1384_CR3","doi-asserted-by":"crossref","unstructured":"Yadav, Samir S and Jadhav, Shivajirao M, \u201cDeep convolutional neural network based medical image classification for disease diagnosis,\u201d Journal of Big Data, 6, 1-18\u00a0(2019).","DOI":"10.1186\/s40537-019-0276-2"},{"key":"1384_CR4","doi-asserted-by":"crossref","unstructured":"G\u00f3mez-Flores, Wilfrido and Pereira, Wagner Coelho de Albuquerque, \u201cGray-to-color image conversion in the classification of breast lesions on ultrasound using pre-trained deep neural networks,\" Medical & Biological Engineering & Computing, 61, 3193-3207\u00a0(2023).","DOI":"10.1007\/s11517-023-02928-6"},{"key":"1384_CR5","doi-asserted-by":"crossref","unstructured":"Chen, LiFang and Li, Jiawei and Ge, Hongze, \u201cTBUnet: A pure convolutional U-Net capable of multifaceted feature extraction for medical image segmentation,\" Journal of Medical Systems, 47, 122\u00a0(2023).","DOI":"10.1007\/s10916-023-02014-2"},{"key":"1384_CR6","doi-asserted-by":"crossref","unstructured":"Rajeev, R and Samath, J Abdul and Karthikeyan, NK, \u201cAn intelligent recurrent neural network with long short-term memory (LSTM) BASED batch normalization for medical image denoising,\" Journal of Medical Systems, 43, 234\u00a0(2019).","DOI":"10.1007\/s10916-019-1371-9"},{"key":"1384_CR7","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1007\/s10278-022-00677-w","volume":"35","author":"Kermouni Serradj","year":"2022","unstructured":"Kermouni Serradj, Nadia and Messadi, Mahammed and Lazzouni, Sihem, \u201cClassification of mammographic ROI for microcalcification detection using multifractal approach, Journal of Digital Imaging, 35, 1544-1559\u00a0(2022).","journal-title":"Journal of Digital Imaging"},{"key":"1384_CR8","doi-asserted-by":"crossref","unstructured":"Moradi, Sasan and Brandner, Christoph and Spielvogel, Clemens and Krajnc, Denis and et al., \u201cClinical data classification with noisy intermediate scale quantum computers,\" Scientific Reports, 12, 1851\u00a0(2022).","DOI":"10.1038\/s41598-022-05971-9"},{"key":"1384_CR9","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1007\/s11517-023-02793-3","volume":"61","author":"Yong Shang","year":"2023","unstructured":"Shang, Yong and Gao, Xing and An, Aimin, \u201cMulti-band spatial feature extraction and classification for motor imaging EEG signals based on OSFBCSP-GAO-SVM model: EEG signal processing,\" Medical & Biological Engineering & Computing, 61, 1581-1602\u00a0(2023).","journal-title":"Medical & Biological Engineering & Computing"},{"key":"1384_CR10","doi-asserted-by":"crossref","unstructured":"Radovi\u0107, Nevena and Prelevi\u0107, Vladimir and Erceg, Milena and Antunovi\u0107, Tanja, \u201cMachine learning approach in mortality rate prediction for hemodialysis patients,\" Computer Methods in Biomechanics and Biomedical Engineering, 25, 111-122, Taylor & Francis\u00a0(2022).","DOI":"10.1080\/10255842.2021.1937611"},{"key":"1384_CR11","doi-asserted-by":"crossref","unstructured":"Baji, Faiq Sabbar and Abdullah, Saleema Baji and Abdulsattar, Fatimah S, \u201cK-mean clustering and local binary pattern techniques for automatic brain tumor detection,\" Bulletin of Electrical Engineering and Informatics, 12, 1586-1594\u00a0(2023).","DOI":"10.11591\/eei.v12i3.4404"},{"key":"1384_CR12","unstructured":"DL, M and DP, M, \u201cProcessing of clinical notes for efficient diagnosis with feedback attention\u2013based BiLSTM,\" Journal of Digital Imaging, 36,1431\u00a0(2023)."},{"key":"1384_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2018.2701164","volume":"16","author":"Bernd Carsten Stahl","year":"2018","unstructured":"Stahl, Bernd Carsten and Wright, David, \u201cEthics and privacy in AI and big data: Implementing responsible research and innovation,\" IEEE Security & Privacy, 16, 26-33\u00a0(2018).","journal-title":"IEEE Security & Privacy"},{"key":"1384_CR14","doi-asserted-by":"publisher","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","volume":"8","author":"Harry Chandra Tanuwidjaja","year":"2020","unstructured":"Tanuwidjaja, Harry Chandra and Choi, Rakyong and Baek, Seunggeun and Kim, Kwangjo, \u201cPrivacy-preserving deep learning on machine learning as a service: a comprehensive survey,\" IEEE Access, 8, 167425-167447\u00a0(2020).","journal-title":"IEEE Access"},{"key":"1384_CR15","doi-asserted-by":"crossref","unstructured":"Pulido-Gaytan, Bernardo and Tchernykh, Andrei and Cort\u00e9s-Mendoza, Jorge M and Babenko, Mikhail and Radchenko, Gleb and et al., \u201cPrivacy-preserving neural networks with homomorphic encryption: Challenges and opportunities,\" Peer-to-Peer Networking and Applications, 14, 1666-1691\u00a0(2021).","DOI":"10.1007\/s12083-021-01076-8"},{"key":"1384_CR16","doi-asserted-by":"crossref","unstructured":"de Almeida, Patricia Gomes R\u00eago and dos Santos, Carlos Denner and Farias, Josivania Silva, \u201cArtificial intelligence regulation: a framework for governance,\" Ethics and Information Technology, 23, 505-525\u00a0(2021).","DOI":"10.1007\/s10676-021-09593-z"},{"key":"1384_CR17","unstructured":"Gilad-Bachrach, Ran and Dowlin, Nathan and Laine, Kim and Lauter, Kristin and Naehrig, Michael and Wernsing, John, \u201cCryptonets: Applying neural networks to encrypted data with high throughput and accuracy,\" in Proceedings of the International Conference on Machine Learning, 201-210, PMLR\u00a0(2016),"},{"key":"1384_CR18","unstructured":"Chou, Edward and Beal, Josh and Levy, Daniel and Yeung, Serena and Haque, Albert and Fei-Fei, Li, \u201cFaster cryptonets: Leveraging sparsity for real-world encrypted inference,\" in arXiv:1811.09953"},{"key":"1384_CR19","unstructured":"Hesamifard, Ehsan and Takabi, Hassan and Ghasemi, Mehdi, \u201cCryptodl: Deep neural networks over encrypted data,\" in arXiv:1711.05189"},{"key":"1384_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCI.2022.3180883","volume":"17","author":"Alessandro Falcetta","year":"2022","unstructured":"Falcetta, Alessandro and Roveri, Manuel, \u201cPrivacy-preserving deep learning with homomorphic encryption: An introduction,\" IEEE Computational Intelligence Magazine, 17, 14-25\u00a0(2022)","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"1384_CR21","doi-asserted-by":"crossref","unstructured":"Cheon, Jung Hee and Kim, Dongwoo and Kim, Duhyeong and Lee, Hun Hee and Lee, Keewoo, \u201cNumerical method for comparison on homomorphically encrypted numbers,\" in Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, 415-445, Springer\u00a0(2019).","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"1384_CR22","unstructured":"Rivest, Ronald L and Adleman, Len and Dertouzos, Michael L and others, \u201cOn data banks and privacy homomorphisms,\" Foundations of Secure Computation, 4, 169-180\u00a0(1978)."},{"key":"1384_CR23","doi-asserted-by":"crossref","unstructured":"Naccache, David and Stern, Jacques, \u201cA new public key cryptosystem based on higher residues,\" in Proceedings of the 5th ACM Conference on Computer and Communications Security, 59-66, ACM\u00a0(1998).","DOI":"10.1145\/288090.288106"},{"key":"1384_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto, Tatsuaki and Uchiyama, Shigenori \u201cA new public-key cryptosystem as secure as factoring,\" in Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, 308-318, Springer\u00a0(1998).","DOI":"10.1007\/BFb0054135"},{"key":"1384_CR25","doi-asserted-by":"crossref","unstructured":"Paillier, Pascal, \u201cPublic-key cryptosystems based on composite degree residuosity classes,\" in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, 223-238, Springer\u00a0(1999).","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1384_CR26","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"Taher ElGamal","year":"1985","unstructured":"ElGamal, Taher, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\" IEEE Transactions on Information Theory, 31, 469-472\u00a0(1985).","journal-title":"IEEE Transactions on Information Theory"},{"key":"1384_CR27","doi-asserted-by":"crossref","unstructured":"Gentry, Craig, \u201cFully homomorphic encryption using ideal lattices,\" in Proceedings of the 41th Annual ACM Symposium on Theory of Computing, 169-178, ACM\u00a0(2009).","DOI":"10.1145\/1536414.1536440"},{"key":"1384_CR28","doi-asserted-by":"crossref","unstructured":"Van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan, Vinod, \u201cFully homomorphic encryption over the integers,\" in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, 24-43, Springer\u00a0(2010).","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"1384_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Zvika Brakerski","year":"2014","unstructured":"Brakerski, Zvika and Gentry, Craig and Vaikuntanathan, Vinod, \u201c(Leveled) fully homomorphic encryption without bootstrapping,\" ACM Transactions on Computation Theory, 6, 1-36\u00a0(2014).","journal-title":"ACM Transactions on Computation Theory"},{"key":"1384_CR30","doi-asserted-by":"crossref","unstructured":"Bos, Joppe W, Lauter, Kristin, Loftus, Jake and Naehrig, Michael, \u201cImproved security for a ring-based fully homomorphic encryption scheme,\u201d Cryptography and Coding, 45-64\u00a0(2013)","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"1384_CR31","unstructured":"Fan, Junfeng and Vercauteren, Frederik, \u201cSomewhat practical fully homomorphic encryption,\" Cryptology ePrint Archive, 2012."},{"key":"1384_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Jian and Juuti, Mika and Lu, Yao and Asokan, Nadarajah, \u201cOblivious neural network predictions via minionn transformations,\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 619-631, ACM\u00a0(2017).","DOI":"10.1145\/3133956.3134056"},{"key":"1384_CR33","doi-asserted-by":"crossref","unstructured":"Bourse, Florian and Minelli, Michele and Minihold, Matthias and Paillier, Pascal, \u201cFast homomorphic evaluation of deep discretized neural networks,\" in Proceedings of the 2018 38th Annual International Cryptology Conference, 483-512, Springer\u00a0(2018).","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"1384_CR34","doi-asserted-by":"crossref","unstructured":"Wang, Yu and Chen, Liquan and Wu, Ge and Yu, Kunliang and Lu, Tianyu, \u201cEfficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing,\" Computers & Security, 128, 103163\u00a0(2023).","DOI":"10.1016\/j.cose.2023.103163"},{"key":"1384_CR35","doi-asserted-by":"crossref","unstructured":"Boemer, Fabian and Costache, Anamaria and Cammarota, Rosario and Wierzynski, Casimir, \u201cnGraph-HE2: A high-throughput framework for neural network inference on encrypted data,\" in Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 45-56, ACM\u00a0(2019).","DOI":"10.1145\/3338469.3358944"},{"key":"1384_CR36","doi-asserted-by":"crossref","unstructured":"Mishra, Pratyush and Lehmkuhl, Ryan and Srinivasan, Akshayaram and Zheng, Wenting and Popa, Raluca Ada, \u201cDelphi: A cryptographic inference system for neural networks,\" in Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 27-30, ACM\u00a0(2020).","DOI":"10.1145\/3411501.3419418"},{"key":"1384_CR37","doi-asserted-by":"crossref","unstructured":"Yao, Andrew C, \u201cProtocols for secure computations,\" in Proceedings of the 1982 23rd Annual Symposium on Foundations of Computer Science, 160-164, IEEE\u00a0(1982).","DOI":"10.1109\/SFCS.1982.38"},{"key":"1384_CR38","doi-asserted-by":"crossref","unstructured":"Barni, Mauro and Orlandi, Claudio and Piva, Alessandro, \u201cA privacy-preserving protocol for neural-network-based computation,\" in Proceedings of the 8th Workshop on Multimedia and Security, 146-151, ACM\u00a0(2006).","DOI":"10.1145\/1161366.1161393"},{"key":"1384_CR39","doi-asserted-by":"crossref","unstructured":"Mohassel, Payman and Zhang, Yupeng, \u201cSecureml: A system for scalable privacy-preserving machine learning,\" in Proceedings of the 2017 IEEE Symposium on Security and Privacy, 19-38, IEEE\u00a0(2017).","DOI":"10.1109\/SP.2017.12"},{"key":"1384_CR40","doi-asserted-by":"crossref","unstructured":"Rouhani, Bita Darvish and Riazi, M Sadegh and Koushanfar, Farinaz, \u201cDeepsecure: Scalable provably-secure deep learning,\" in Proceedings of the 55th Annual Design Automation Conference, 1-6, ACM\u00a0(2018).","DOI":"10.1145\/3195970.3196023"},{"key":"1384_CR41","unstructured":"Juvekar, Chiraag and Vaikuntanathan, Vinod and Chandrakasan, Anantha, \u201c$$\\{$$GAZELLE$$\\}$$: A low latency framework for secure neural network inference,\" in Proceedings of the 2018 27th USENIX Security Symposium, 1651-1669, USENIX\u00a0(2018)."},{"key":"1384_CR42","doi-asserted-by":"crossref","unstructured":"Yang, Jiancheng and Shi, Rui and Wei, Donglai and Liu, Zequan and Zhao, Lin and et al., \u201cMedmnist v2-a large-scale lightweight benchmark for 2d and 3d biomedical image classification,\" Scientific Data, 10, 41\u00a0(2023).","DOI":"10.1038\/s41597-022-01721-8"},{"key":"1384_CR43","unstructured":"Ioffe Sergey and Christian Szegedy, \u201cBatch normalization: Accelerating deep network training by reducing internal covariate shift,\" in Proceedings of the International Conference on Machine Learning, 448-456, PMLR\u00a0(2015)."},{"key":"1384_CR44","doi-asserted-by":"crossref","unstructured":"Hassan, Abdelrhman and Liu, Fei and Wang, Fanchuan and Wang, Yong, \u201cSecure content based image retrieval for mobile users with deep neural networks in the cloud,\" Journal of Systems Architecture, 116, 102043\u00a0(2021).","DOI":"10.1016\/j.sysarc.2021.102043"},{"key":"1384_CR45","doi-asserted-by":"crossref","unstructured":"Ibarrondo, Alberto and Viand, Alexander, \u201cPyfhel: Python for homomorphic encryption libraries,\" in Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 11-16, ACM\u00a0(2021).","DOI":"10.1145\/3474366.3486923"}],"container-title":["Journal of Imaging Informatics in Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-024-01384-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10278-024-01384-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-024-01384-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T22:48:21Z","timestamp":1761778101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10278-024-01384-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,3]]},"references-count":45,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["1384"],"URL":"https:\/\/doi.org\/10.1007\/s10278-024-01384-4","relation":{},"ISSN":["2948-2933"],"issn-type":[{"value":"2948-2933","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,3]]},"assertion":[{"value":"9 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}